1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ZanzabumX [31]
4 years ago
6

Your friend gave you a flash drive containing photos from a weekend event. After you copy the files, you notice a bunch of .DS f

iles in addition to labeled photos. These files can be deleted because they are simply _____ files from a mac
Computers and Technology
1 answer:
Katen [24]4 years ago
4 0

Answer:

The correct answer to the following question will be "Resource fork".

Explanation:

A fork seems to be a set of results or data linked to an object on the file system.

  • The software fork is indeed a fork or portion of a directory on Apple products classic Mac OS, often migrated for consistency to the new macOS, always had to hold structured data or tuples along with massive amounts of data contained throughout the code fork.
  • Apart from labeled images, DS documents could be removed because they become merely tool fork files from such a mac.

Therefore, it's the right answer.

You might be interested in
Enumera 3 exemple de operatii de lucru cu elementele grafice 3D. Repede va rog dau coroana
True [87]

Answer:

can't understand the language

8 0
3 years ago
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended
sergiy2304 [10]

Answer:

SQL injection

Explanation:

SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.

Using placeholders in programmed SQL statements mitigates the effects of SQL injection.

6 0
3 years ago
The processor itself is not a resource, therefore the OS is not involved in deciding how much of the processor time is used for
photoshop1234 [79]

Answer:

False

Explanation:

In computing, a resource can be defined as a component with limited or varying size/capability. Every computer has a processor whose capability is measured by the number of instructions it can perform in a given unit of time (Clock speed), The number of cores, the size of cache memory and of course the make i.e. AMD or Intel.

One of the functions of the Operating systems in relation to CPU is CPU Scheduling. This is whereby the process manager determines the process to be allocated the resource (CPU) basing on the suitable criteria.

The scheduling criteria is based on:

a. CPU Utilization ensures that the CPU is busy all the time.

b. Throughput is the number of processes that can be executed per unit given time.  

c. Turn Around Time which is the time it takes to get the final output after the process has been allocated the CPU.

d. Waiting Time defined as the length of time a process takes in the ready queue.

e. Response Time defined as the difference in time between the arrival time and the time it starts executing.

The algorithms selected aims at:

1. Maximize CPU utilization

2. Maximize throughput

3. Minimize Turn Around Time, Waiting Time and Response Time

The operating system uses the scheduling criteria to determine the best algorithm to be used to give a number of processes.

These algorithms can be grouped as either preemptive or non-preemptive.

Preemptive means once the process has been allocated to the CPU and can be interrupted before it completes its burst time. Examples include:

a. Round Robin

b. Shortest Remaining Time First (SRTF)

c. Priority Scheduling

Non-preemptive scheduling algorithm works in a way that once a process has been allocated the CPU it cannot be halted or paused until it has completed its burst time. Examples include:

a. First Come First Serve (FCFS)

b. Shortest Job First (SJF)

c. Priority Scheduling

7 0
3 years ago
Read 2 more answers
how is a two-dimensional array different from a traditional one dimensional array? From an ArrayList?
mrs_skeptik [129]
An ArrayList is just like a 1D Array except it's length is unbounded and you can add as many elements as you need. The only difference when making a 2D array is that you now have two sets of brackets, the first one representing the number of rows you want and the second representing your columns.
6 0
3 years ago
I am needing help with this homework of mine.
KengaRu [80]
It doesn’t show nothing in the picture
8 0
3 years ago
Other questions:
  • Type of file can a user send a technician in order to get help remotely, when using remote assistance
    5·1 answer
  • Write a program to read in a two values row and col to initialize a 2D array using those values. Then create a function FindTran
    15·1 answer
  • Write a statement to add the key Tesla with value USA to car_makers. Modify the car maker of Fiat to Italy. Sample output for th
    9·1 answer
  • If a file's permissions are set to 760, what permission(s) are available to the group assigned to the file?â
    11·1 answer
  • Your electric service has been failing with some frequency lately because of a lot of storms, and you are looking for more peace
    14·1 answer
  • What do you do when you have computer problems? Check all that apply. PLEASE HELP
    9·2 answers
  • Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user
    9·1 answer
  • Program a substitution cipher in Python. Create 2 functions one for encryption and the other for decryption ( get the text as th
    8·1 answer
  • $
    15·2 answers
  • A company is looking for an employee to help organize customer information for the sales team. Which computer field includes thi
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!